- Description
- In the Linux kernel, the following vulnerability has been resolved: mtd: rawnand: fix double free in atmel_pmecc_create_user() The "user" pointer was converted from being allocated with kzalloc() to being allocated by devm_kzalloc(). Calling kfree(user) will lead to a double free.
- Source
- 416baaa9-dc9f-4396-8d5f-8c081fb06d67
- NVD status
- Modified
CVSS 3.1
- Type
- Primary
- Base score
- 7.8
- Impact score
- 5.9
- Exploitability score
- 1.8
- Vector string
- CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
- Severity
- HIGH
- nvd@nist.gov
- CWE-415
- Hype score
- Not currently trending
CVE-2024-56766 Double Free Vulnerability Patched in Linux Kernel’s Raw NAND In the Linux kernel, a vulnerability in the mtd: rawnand was fixed. This issue was in the atmel_pmecc_create_user() function. The "user"... https://t.co/16iBoezNUs
@VulmonFeeds
6 Jan 2025
40 Impressions
0 Retweets
1 Like
0 Bookmarks
0 Replies
0 Quotes
CVE-2024-56766 In the Linux kernel, the following vulnerability has been resolved: mtd: rawnand: fix double free in atmel_pmecc_create_user() The "user" pointer was converted from… https://t.co/i02iPBtA2F
@CVEnew
6 Jan 2025
261 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
[
{
"nodes": [
{
"negate": false,
"cpeMatch": [
{
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"vulnerable": true,
"matchCriteriaId": "3C960EB7-4E90-49E0-BB92-BE6F1B8CF26F",
"versionEndExcluding": "4.20",
"versionStartIncluding": "4.19.325"
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"vulnerable": true,
"matchCriteriaId": "2E049AFB-F729-4E03-87D4-2BB4FFA5E622",
"versionEndExcluding": "5.5",
"versionStartIncluding": "5.4.287"
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"vulnerable": true,
"matchCriteriaId": "055DF185-747E-444A-AEC9-E23AA67777A2",
"versionEndExcluding": "5.11",
"versionStartIncluding": "5.10.231"
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"vulnerable": true,
"matchCriteriaId": "5EDFC1D5-0414-42C6-B6E2-1101700AA7DE",
"versionEndExcluding": "5.16",
"versionStartIncluding": "5.15.174"
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"vulnerable": true,
"matchCriteriaId": "010819A3-7BB5-4ACE-9F5E-C53664C957C2",
"versionEndExcluding": "6.1.123",
"versionStartIncluding": "6.1.120"
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"vulnerable": true,
"matchCriteriaId": "1DA730E9-7DB9-4919-A111-9038A4685B92",
"versionEndExcluding": "6.6.69",
"versionStartIncluding": "6.6.64"
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"vulnerable": true,
"matchCriteriaId": "4CBF5F6E-D446-4CAE-AAA4-413442319824",
"versionEndExcluding": "6.12",
"versionStartIncluding": "6.11.11"
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"vulnerable": true,
"matchCriteriaId": "42EECCF9-F7F0-46E2-A493-B31E541E6147",
"versionEndExcluding": "6.12.8",
"versionStartIncluding": "6.12.2"
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:6.13:rc1:*:*:*:*:*:*",
"vulnerable": true,
"matchCriteriaId": "62567B3C-6CEE-46D0-BC2E-B3717FBF7D13"
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:6.13:rc2:*:*:*:*:*:*",
"vulnerable": true,
"matchCriteriaId": "5A073481-106D-4B15-B4C7-FB0213B8E1D4"
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:6.13:rc3:*:*:*:*:*:*",
"vulnerable": true,
"matchCriteriaId": "DE491969-75AE-4A6B-9A58-8FC5AF98798F"
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:6.13:rc4:*:*:*:*:*:*",
"vulnerable": true,
"matchCriteriaId": "93C0660D-7FB8-4FBA-892A-B064BA71E49E"
}
],
"operator": "OR"
}
]
}
]